Wednesday, October 29, 2014

FireEye's APT28 report is the latest in a series of glossy marketing white papers which claim to reveal the workings of "state-sponsored actors", in this case from Russia. The paper fails to prove its claim of state-sponsorship (a confusing term that the FireEye report never defines) and evidences a few other bad habits described below.

However none of that really matters because Russia is currently on the White House's shit list, it's being hammered by sanctions, and the Kremlin has shown itself over the years to be more than willing to let its very talented hacker population engage in cyber attacks against its political enemies without repercussion.

Last year when Mandiant came out with its APT1 report about China, guess who was on the White House's shit list then?

From a marketing perspective, you can say-hint-imply-presume whatever you want. Proof is irrelevant. What counts is that the political interests of the U.S. and other western nations correspond with the marketing interests of cyber security companies. Timing - as Hesiod said - is everything.

However, even if the raw commercialism of this strategy doesn't bother you or is at least forgivable because after all FireEye and all of its competitors are for-profit enterprises, the report's authors have made some awful decisions in their analytic method.

Cherry-Picking The Evidence

"APT28 has targeted a variety of organizations that fall outside of the three themes we highlighted above. However, we are not profiling all of APT28’s targets with the same detail because they are not particularly indicative of a specific sponsor’s interests.They do indicate parallel areas of interest to many governments and do not run counter to Russian state interests."

In other words, we've just included the evidence that supports our theory and excluded the evidence that doesn't. That's precisely the kind of bad analysis that's behind every intelligence failure that has ever happened.

Calling Low Level Attacks "Sophisticated"

"Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations. This perception is due in part to the Russian government’s alleged involvement in the cyber attacks accompanying its invasion of Georgia in 2008, as well as the rampant speculation that Moscow was behind a major U.S. Department of Defense network compromise, also in 2008. These rumored activities, combined with a dearth of hard evidence, have made Russia into something of a phantom in cyberspace."

Speaking as someone who's been researching Russian information warfare practices and, more importantly, its ongoing research and development in information security, I can tell you that the SQL attacks against Georgian government websites during the 2008 war were not even close to "sophisticated". Same with the 2008 DOD breach. Remember that when you have to explain to your boss that some unemployed Russian kid Russian "state-sponsored" actors stole everything you own, it better be because it was "highly sophisticated".

Unfortunately for myself and others who take a skeptical or even cynical view to every public report of a "sophisticated state-sponsored" attack, the reporting agency or corporation never shares their raw data. And whatever is shared is scrubbed.

APT28 isn't a Person or Persons. It's a Thing

Cyber security companies that monitor networks and threat actors rely almost exclusively upon technical attributes when they establish a "group". It's not like a street gang unit at your local PD that can tell you the gangs that operate in an area, who the members are and where they go when they leave. They don't who the members are, or how many there are, or what nationality they are, or who they're working for, or how long they stay before moving on. Visit ZoneH.org and pick any hacker group that does high-profile defacements. Do a search by group name and find one with a history spanning just one year. Start with the earliest defacement and add the aliases of the group's members to a spreadsheet. Jump ahead a few months and check to see if the names have changed. Jump ahead a year. Members come and go, and when they go they take with them the tools and resources that they are comfortable with using. Or perhaps they'll discover new tools with a different group and in a few months, jump again - this time with different TTPs than they had a year ago. Are they still "APT28"?

"Stop The Madness"

To quote Mr. Wonderful, "STOP THE MADNESS!" Reports like these cannot be trusted to give a factual assessment of the real-world capabilities of any government's activities with their resident hacker populations. And they positively do not reflect the capabilities of any government's security services.

They are (1) a way to gain market share through garnering headlines and (2) a way to gain favor or secure contracts with government agencies who are catering to their customer - the Executive Office of the President.

Wednesday, October 22, 2014

From time to time I like to share gems of insight that I've discovered in the works of others in hopes that someone else will benefit besides myself. I'm always the first one awake in our house (usually before dawn) so I make a double expresso and sit down at my desk, which faces East overlooking the Hood Canal. Ellis' book is a collection of ancient Egyptian texts so it's fun to open it up randomly and see where you land. This is what I opened to this morning, around the time that dawn was breaking.

Thoth Speaks:
The ibis and the ink pot - these are blessed. For as the ibis pecks along the bank for a bit of food, so the scribe searches among his thoughts for some truth to tell. All the work is his to speak, its secrets writ down in his heart from the beginning of time, the gods' words rising upward through his dark belly, seeking light at the edge of his throat. We are made of god stuff, the explosion of stars, particles of light, molded in the presence of gods. The gods are with us. Their secrets writ only in the scrolls of men's hearts, the law of creation, death and change inscribed in the blood and seed of man's love. In the beginning and at the end, the book is opened and we see what in life we are asked to remember.

Hear, then, my words, the ringing of my speech, as the heart and the scroll of this life fall open. Truth is the harvest scythe. What is sown - love or anger or bitterness - that shall be your bread. The corn is no better than its seed, then let what you plant be good. Let your touch on earth be light so that when earth covers you, the clods of dirt fall lightly. The soul of a man forgets nothing. It stands amazed at its own being. The heart beats the rhythm of its life. The lungs breathe the ions of its own vibration. The mind recalls its thoughts. The glands respond to its emotions.

The body is a soul's record. And when a man's life ends, his body is given back to gods and the gods shall see what use their laws have been. They shall see the deeds its hands have made, the sparks of light its heart set in the world. They shall see whether or not their love, their powers have been wasted, whether the plants it has grown were nourishing or poison. And like the ibis, the gods shall circle about him, hunting for seeds that remain uncultivated, for ideas that lie dormant, thoughts left unexpressed.

They shall find new seeds from the plants he has tended. And these shall be planted again in the clay of a new man and he shall be sent back to the world until all the gods have seen fit to create in man is cultivated, and then, in final death, he shall be welcomed home as one of them.

Saturday, October 11, 2014

Early bird registration is now open for Suits and Spooks DC. We've expanded it to three days so as to include one optional day of training (Wednesday Feb 4). Since this is Suits and Spooks and not your typical Security conference, you've never had training like this before:

The training will be given in a tiered classroom setting with microphones at every seat and two large projection screens behind the instructor.

On Thursday (Feb 5) and Friday (Feb 6) our DC collision event will be held with a very unique collection of speakers that include John Robb (military strategist, futurist, and author of Open Source Warfare), Zachary Tumin (Deputy Commissioner for Strategic Initiatives at the NYPD), Thomas Rid (Professor at Kings College London and author "Cyber War Does Not Exist"), John Holland (CISO of Risk Division of Credit Suisse), and Ben Milne (founder of Dwolla).

You'll also get a very rare, inside look at how one of the world's largest defense contractors defends its global network, learn about Bitcoins and how at least one international bank is dealing with them, engage in a Q&A with a US Assistant District Attorney (invited), and much, much more.

Our Early Bird discount is $675 for all three days or $575 without the workshops. GOV/MIL rates are $395/$325. This event always sells out so register early.